Skip to main content

and
  1. Chapter and Conference Paper

    Broadcast Encryption for Differently Privileged

    Broadcast encryption is a primary technology that has been used for content protection. It enables a broadcaster to distribute content to a set of users so that only a privileged subset of users can access the...

    Hongxia **, Jeffery Lotspiech in Emerging Challenges for Security, Privacy and Trust (2009)

  2. Chapter and Conference Paper

    Efficient Coalition Detection in Traitor Tracing

    In this paper we study the traitor tracing problem for re-broadcasting attack. In this attack, instead of building a pirate clone device (or program) based on their secret keys and sell the clone, the attacker...

    Hongxia **, Jeffery Lotspiech in Proceedings of The Ifip Tc 11 23rd Interna… (2008)

  3. Chapter and Conference Paper

    Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack

    In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or content decrypting key are found, a traitor tracing scheme could identify at le...

    Hongxia **, Jeffery Lotspiech in Computer Security – ESORICS 2007 (2007)

  4. No Access

    Chapter and Conference Paper

    Practical Forensic Analysis in Advanced Access Content System

    In this paper we focus on the use of a traitor tracing scheme for distribution models that are one-to-many. It can be a networked broadcast system; It can be based on prerecorded or recordable physical media. ...

    Hongxia **, Jeffery Lotspiech in Information Security Practice and Experience (2006)

  5. Chapter and Conference Paper

    Flexible Traitor Tracing for Anonymous Attacks

    Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to iden...

    Hongxia **, Jeffery Lotspiech in Communications and Multimedia Security (2005)

  6. No Access

    Chapter and Conference Paper

    Towards Better Software Tamper Resistance

    Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tam...

    Hongxia **, Ginger Myles, Jeffery Lotspiech in Information Security (2005)

  7. No Access

    Chapter and Conference Paper

    Proactive Software Tampering Detection

    With the advent of digital technologies, digital content piracy has become a growing concern. Unauthorized music and movie copying are eating a big bite of the profit of the record industry and the movie studi...

    Hongxia **, Jeffery Lotspiech in Information Security (2003)